Sometimes I feel like the only 20something that likes C.
@KCombinator @tomdale @kellabyte if you make a single arithmetic mistake you corrupt memory and cause catastrophic security vulnerabilities
-
-
@KCombinator@tomdale@kellabyte an acid test of a good programmer is realizing that’s a losing proposition and moving onto something better -
.
@bascule@tomdale@kellabyte as with all things, it's highly context dependent. Ask@logicalelegance if bare metal programming still counts -
@KCombinator@tomdale@kellabyte@logicalelegance bare metal programming in memory safe languages is very much possible -
@bascule memory bugs are but one class of bug. Plenty of other gotchas. -
@KCombinator memory safety bugs are almost always catastrophic from a security perspective -
Tweet unavailable
-
@amidvidy@KCombinator sure, but at least they're called out explicitly so people looking for vulns know where to look -
@bascule I mean, this is difficult, because new classes of attacks are possible. For example, how would one detect a timing attack? - 6 more replies
New conversation -
-
-
.
@bascule@tomdale@kellabyte even when it's easy to do, how much software actually uses a provable security model? Pretty weak argument.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.